390 research outputs found
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organization that somehow were able to impersonate legitimate users. Consequently, it is assumed that masqueraders are unaware of the protected environment within the targeted organization, so it is expected that they move in a more erratic manner than legitimate users along the compromised systems. This feature makes them susceptible to being discovered by dynamic user verification methods based on user profiling and anomaly-based intrusion detection. However, these approaches are susceptible to evasion through the imitation of the normal legitimate usage of the protected system (mimicry), which is being widely exploited by intruders. In order to contribute to their understanding, as well as anticipating their evolution, the conducted research focuses on the study of mimicry from the standpoint of an uncharted terrain: the masquerade detection based on analyzing locality traits. With this purpose, the problem is widely stated, and a pair of novel obfuscation methods are introduced: locality-based mimicry by action pruning and locality-based mimicry by noise generation. Their modus operandi, effectiveness, and impact are evaluated by a collection of well-known classifiers typically implemented for masquerade detection. The simplicity and effectiveness demonstrated suggest that they entail attack vectors that should be taken into consideration for the proper hardening of real organizations
Recommended from our members
Towards Effective Masquerade Attack Detection
Data theft has been the main goal of the cybercrime community for many years, and more and more so as the cybercrime community gets more motivated by financial gain establishing a thriving underground economy. Masquerade attacks are a common security problem that is a consequence of identity theft and that is generally motivated by data theft. Such attacks are characterized by a system user illegitimately posing as another legitimate user. Prevention-focused solutions such as access control solutions and Data Loss Prevention tools have failed in preventing these attacks, making detection not a mere desideratum, but rather a necessity. Detecting masqueraders, however, is very hard. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. These approaches suffered from high miss and false positive rates. None of these approaches could be packaged into an easily-deployable, privacy-preserving, and effective masquerade attack detector. In this thesis, I present a machine learning-based technique using a set of novel features that aim to reveal user intent. I hypothesize that each individual user knows his or her own file system well enough to search in a limited, targeted, and unique fashion in order to find information germane to their current task. Masqueraders, on the other hand, are not likely to know the file system and layout of another user's desktop, and would likely search more extensively and broadly in a manner that is different from that of the victim user being impersonated. Based on this assumption, I model a user's search behavior and monitor deviations from it that could indicate fraudulent behavior. I identify user search events using a taxonomy of Windows applications, DLLs, and user commands. The taxonomy abstracts the user commands and actions and enriches them with contextual information. Experimental results show that modeling search behavior reliably detects all simulated masquerade activity with a very low false positive rate of 1.12%, far better than any previously published results. The limited set of features used for search behavior modeling also results in considerable performance gains over the same modeling techniques that use larger sets of features, both during sensor training and deployment. While an anomaly- or profiling-based detection approach, such as the one used in the user search profiling sensor, has the advantage of detecting unknown attacks and fraudulent masquerade behaviors, it suffers from a relatively high number of false positives and remains potentially vulnerable to mimicry attacks. To further improve the accuracy of the user search profiling approach, I supplement it with a trap-based detection approach. I monitor user actions directed at decoy documents embedded in the user's local file system. The decoy documents, which contain enticing information to the attacker, are known to the legitimate user of the system, and therefore should not be touched by him or her. Access to these decoy files, therefore, should highly suggest the presence of a masquerader. A decoy document access sensor detects any action that requires loading the decoy document into memory such as reading the document, copying it, or zipping it. I conducted human subject studies to investigate the deployment-related properties of decoy documents and to determine how decoys should be strategically deployed in a file system in order to maximize their masquerade detection ability. Our user study results show that effective deployment of decoys allows for the detection of all masquerade activity within ten minutes of its onset at most. I use the decoy access sensor as an oracle for the user search profiling sensor. If abnormal search behavior is detected, I hypothesize that suspicious activity is taking place and validate the hypothesis by checking for accesses to decoy documents. Combining the two sensors and detection techniques reduces the false positive rate to 0.77%, and hardens the sensor against mimicry attacks. The overall sensor has very limited resource requirements (40 KB) and does not introduce any noticeable delay to the user when performing its monitoring actions. Finally, I seek to expand the search behavior profiling technique to detect, not only malicious masqueraders, but any other system users. I propose a diversified and personalized user behavior profiling approach to improve the accuracy of user behavior models. The ultimate goal is to augment existing computer security features such as passwords with user behavior models, as behavior information is not readily available to be stolen and its use could substantially raise the bar for malefactors seeking to perpetrate masquerade attacks
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed web- sites and scareware to name a few. This paper presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial
Learning analytics visualizations of student-activity time distribution for the open Edx platform
MOOCs are one of the current trending topics in educational technology. They
surged with the vision of a democratization in education worldwide by removing
some access barriers. As every technology, MOOCs have promoters and detractors
but truth is, they are an invaluable source of data related to student interaction with
courses and their resources as has been available never before. This data is susceptible
to shed light on the learning process in this online environment and potentially
in
uence in a positive way the learning outcomes. Students can be presented with
visual, friendly information that enable them to re
ect on their performance and
gain awareness of their own learning style based on data beyond intuition. Teachers
can be given the same metrics augmented with student aggregates for their courses.
Thus, they can tune their pedagogical approach and resource quality for the better.
In this context, Open edX is one of the most prominent MOOC platforms. However,
its learning analytics support is low at present. This project extends the learning
analytics support of the Open edX platform by adding new six visualizations related
to time on video and problem modules, namely: 1) video time watched, 2) video
and 3) problem time distributions, 4) video repetition pro le, 5) daily time on video
and problem and 6) distribution of video events. The main technologies used have
been Python, Django, MySQL, JavaScript, Google Charts and MongoDBLos MOOCs están de moda en lo que se refiere a tecnología educativa. Surgieron con
la visión de remover algunas barreras de acceso en aras de la democratización de la
educación en cada rincón del mundo. Como toda tecnología, tienen sus promotores y
detractores, pero lo cierto es que constituyen una valiosa fuente de datos como no ha
habido antes en lo que respecta a la interacción de los estudiantes con estos cursos y
sus recursos. Estos datos pueden ayudarnos a entender el proceso de aprendizaje en
estos entornos. Tienen además el potencial de in
uir positivamente en los resultados
del aprendizaje. Se puede presentar a los estudiantes una información visual fácil
de entender, que les permita re
exionar sobre su rendimiento y ganar conciencia
de su estilo de aprendizaje a partir de los datos, más allá de lo que les pueda
indicar la intuición. Las mismas métricas se pueden poner a disponibilidad de los
profesores, en conjunto con valores agregados de la clase. De esta manera, los
profesores pueden ajustar el enfoque pedagógico del curso y mejorar la calidad de
los recursos. En este contexto, Open edX es una de las plataformas proveedoras de
MOOCs más prominentes. Sin embargo, tiene todavía poco soporte para analitica
del aprendizaje. Este proyecto extiende ese soporte al incorporar seis visualizaciones
nuevas sobre tiempo en vídeos y problemas, especícamente: 1) tiempo visto de
vídeos, distribución de tiempo en 2) vídeos y 3) problemas, 4) peril de repetición
de vídeo, 5) tiempo diario en vídeos y problemas y 6) distribuci on de eventos de
vídeo. Las principales tecnologías usadas son: Python, Django, MySQL, JavaScript,
Google Charts y MongoDB.Ingeniería de Telecomunicació
Selected Computing Research Papers Volume 2 June 2013
An Evaluation of Current Innovations for Solving Hard Disk Drive Vibration Problems (Isiaq Adeola) ........................................................................................................ 1
A Critical Evaluation of the Current User Interface Systems Used By the Blind and Visually Impaired (Amneet Ahluwalia) ................................................................................ 7
Current Research Aimed At Improving Bot Detection In Massive Multiplayer Online Games (Jamie Burnip) ........................................................................................................ 13
Evaluation Of Methods For Improving Network Security Against SIP Based DoS Attacks On VoIP Network Infrastructures (David Carney) ................................................ 21
An Evaluation of Current Database Encryption Security Research (Ohale Chidiebere) .... 29
A Critical Appreciation of Current SQL Injection Detection Methods
(Lee David Glynn) .............................................................................................................. 37
An Analysis of Current Research into Music Piracy Prevention (Steven Hodgson) .......... 43
Real Time On-line Analytical Processing: Applicability Of Parallel Processing Techniques (Kushatha Kelebeng) ....................................................................................... 49
Evaluating Authentication And Authorisation Method Implementations To Create A More Secure System Within Cloud Computing Technologies (Josh Mallery) ................... 55
A Detailed Analysis Of Current Computing Research Aimed At Improving Facial Recognition Systems (Gary Adam Morrissey) ................................................................... 61
A Critical Analysis Of Current Research Into Stock Market Forecasting Using Artificial Neural Networks (Chris Olsen) ........................................................................... 69
Evaluation of User Authentication Schemes (Sukhdev Singh) .......................................... 77
An Evaluation of Biometric Security Methods for Use on Mobile Devices
(Joe van de Bilt) .................................................................................................................. 8
Cloud Computing Security, An Intrusion Detection System for Cloud Computing Systems
Cloud computing is widely considered as an attractive service model because it minimizes investment since its costs are in direct relation to usage and demand. However, the distributed nature of cloud computing environments, their massive resource aggregation, wide user access and efficient and automated sharing of resources enable intruders to exploit clouds for their advantage. To combat intruders, several security solutions for cloud environments adopt Intrusion Detection Systems. However, most IDS solutions are not suitable for cloud environments, because of problems such as single point of failure, centralized load, high false positive alarms, insufficient coverage for attacks, and inflexible design. The thesis defines a framework for a cloud based IDS to face the deficiencies of current IDS technology. This framework deals with threats that exploit vulnerabilities to attack the various service models of a cloud system. The framework integrates behaviour based and knowledge based techniques to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks.
This thesis has three main contributions. The first is a Cloud Intrusion Detection Dataset (CIDD) to train and test an IDS. The second is the Data-Driven Semi-Global Alignment, DDSGA, approach and three behavior based strategies to detect masquerades in cloud systems. The third and final contribution is signature based detection. We introduce two deployments, a distributed and a centralized one to detect host, network, and DDoS attacks. Furthermore, we discuss the integration and correlation of alerts from any component to build a summarized attack report. The thesis describes in details and experimentally evaluates the proposed IDS and alternative deployments.
Acknowledgment:
===============
• This PH.D. is achieved through an international joint program with a collaboration between University of Pisa in Italy (Department of Computer Science, Galileo Galilei PH.D. School) and University of Arizona in USA (College of Electrical and Computer Engineering).
• The PHD topic is categorized in both Computer Engineering and Information Engineering topics.
• The thesis author is also known as "Hisham A. Kholidy"
- …